摘要: 随着云计算下数据外包的流行,可搜索加密的重要性日益凸显。针对Yang等提出的多用户关键词合取搜索方案中,用户必须给全所有关键词值这一局限,设计了一个改进方案。随后,详细分析了新方案的正确性、安全性及运行效率。分析表明,新方案在维持原方案安全性的基础上,实现了用户仅需提交部分关键词这一实用功能。新方案运行效率出色,在云计算“瘦客户机”应用背景下有一定的实践价值。最后附带给出了新方案的一个简易实现。
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83 [2] 张逢喆,陈进,陈海波,等.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011,48(7):1155-1167 [3] 李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37 [4] 杨健,汪海航,王剑,等.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479 [5] 伍琦,万常选,李国林.一个改进型云存储共享方案[J].计算机科学,2012,39(8):99-103 [6] Song D X,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy (S&P’00).2000:44-55 [7] Goh E J.Secure Indexes.http://crypto.stanford.edu/ eu-jin/papers/ secureindex/secureindex.pdf,2003 [8] Chang Y C,Mitzenmacher M.Privacy Preserving Keyword Sear-ches on Remote Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security(ACNS’05).LNCS 3531,2005:442-455 [9] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunc-tive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security(ICICS’05).2005:414-426 [10] Golle P,Staddon J,Waters B.Secure Conjunctive KeywordSearch over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security (ACNS’04).2004:31-45 [11] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]∥Proceedings of ACM Conference on Computer and Communications Security (CCS’06).2006:79-88 [12] Yang Z Q,Zhong S,Wright R.Privacy-Preserving Queries onEncrypted Data[C]∥Proceedings of European Symposium on Research in Computer Security (ESORICS’06).LNCS 4189,2006:479-495 [13] Boneh D,Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04).2004:506-522 [14] Abdalla M,Bellare M,Catalano D,et al.Searchable Encryption Revisited:Consistency Properties,Ration to Anonymous IBE,and Extensions[C]∥Proceedings of International Cryptology Conference (CRYPTO’05).LNCS 3621,2005:205-222 [15] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System[C]∥Proceedings of International Conference on Pairing-Based Cryptography(Pairing’07).LNCS 4575,2007:2-22 [16] Yang Y J,Bao F,Ding X H,et al.Multiuser private queries over encrypted databases[J].Journal of Applied Cryptography,2009,1(4):309-319 [17] Yang Y J,Lu H B,Weng J.Multi-user private keyword search for cloud computing[C]∥Proceedings of Third IEEE International Conference on Cloud Computing Technology and Science(CloudCom’11).2011:264-271 [18] DARPA Information Science and Technology Study Group.Privacy with security[R].Technical report.http://www.cs.berkeley.edu/-tygar/papers/ISAT-final- briefing.pdf,2002-12 [19] Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing[J].Journal of Cryptology,2004,17(4):297-319 [20] Zhu R,Yang G M,Wong D.An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices[C]∥Proceedings of Internet and Network Economics First International workshop (WINE’05).LNCS 3828,2005:500-509 |
No related articles found! |
|